Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    What can we learn from Verizon Data Breach Investigation Report (DBIR)

    By BUFFERZONE Team, 12/06/2023

    Target: Consumers Tags: Threat Intelligence, Malware, Phishing, Insider Threat, Vulnerabilities, Ransomware, Credentials The 2023 Data Breach Investigations Report (DBIR) by Verizon Business has yielded several important insights into the current

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 8/06/2023

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering An Adobe PDF (Portable Document Format) file is a file format developed by Adobe Systems. It

    Read More >

    OneNote Malware Attack Prevention Using Content Disarm and Reconstruction

    By BUFFERZONE Team, 5/06/2023

    Target: Cybersecurity professionals Tags: Microsoft Office, OneNote, Content Disarm & Reconstruction, Zero-Trust Microsoft OneNote [1] is a versatile application included in the Microsoft Office suite, specifically designed for effortless information

    Read More >

    Clipboard Hijacking attacks and How to Prevent Them

    By BUFFERZONE Team, 1/06/2023

    Target: IT Professionals Tags: Malware, Clipboard attack Computer clipboard hijacking attacks occur when an attacker gains unauthorized access to the clipboard of a computer to intercept or modify the data

    Read More >

    Cryptojacking – What is it?

    By BUFFERZONE Team, 30/05/2023

    Target: Executives and business leaders Keywords: Coin miners, malware, bitcoin Cryptojacking is a type of cybercrime in which a hacker gains unauthorized access to a victim’s computer or device and

    Read More >

    What You Should Know About Browser and Endpoint Isolation

    By BUFFERZONE Team, 24/05/2023

    Web security is of paramount importance in today’s digital landscape. Browsers enable access to various types of online resources like websites, digital media, and cloud-based services. However, this also makes

    Read More >